summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Convert legacy TLS client to tls_key_share.jsing2022-01-067-256/+181
* Allocate and free the EVP_AEAD_CTX struct in tls13_record_protection.jsing2022-01-061-7/+13
* Provide CBB_add_u64()jsing2022-01-062-2/+21
* Rename tls13_key_share to tls_key_share.jsing2022-01-059-91/+97
* Return 0 on failure from send/get kex functions in the legacy stack.jsing2022-01-042-43/+43
* Use normal result testing for tls1_check_curve().jsing2022-01-041-2/+2
* Refactor ssl3_get_server_kex_ecdhe() to separate parsing and validation.jsing2022-01-041-20/+18
* Pull key share group/length CBB code up from tls13_key_share_public()jsing2022-01-042-27/+22
* Only allow zero length key shares when we know we're doing HRR.jsing2022-01-041-3/+5
* Hoist memset of CBB above EVP_MD_CTX_new() and HMAC_CTX_new() to avoidtb2021-12-261-3/+3
* Correct SSL_get_peer_cert_chain() when used with the TLSv1.3 stack.jsing2021-12-261-3/+6
* unifdef TLS13_USE_LEGACY_CLIENT_AUTHtb2021-12-161-9/+1
* Use CBS_get_last_u8() to find the content type in TLSv1.3 records.jsing2021-12-151-11/+12
* Provide various CBS_peek_* functions.jsing2021-12-152-2/+109
* Provide CBS_get_u64().jsing2021-12-152-2/+25
* Provide CBS_get_last_u8().jsing2021-12-152-2/+19
* Convert t1_enc.c to opaque EVP_MD_CTX.tb2021-12-091-25/+26
* Convert ssl_srvr.c to opaque EVP_MD_CTX.tb2021-12-091-42/+44
* Convert ssl_clnt.c to opaque EVP_MD_CTXtb2021-12-091-26/+29
* Convert s3_cbc.c to opaque EVP_MD_CTX.tb2021-12-091-9/+10
* Clean up and refactor server side DHE key exchange.jsing2021-12-044-120/+116
* Move the minimum DHE key size check into ssl_kex_peer_params_dhe()jsing2021-12-043-14/+19
* Check DH public key in ssl_kex_peer_public_dhe().jsing2021-12-043-8/+22
* Align ssl_kex_derive_ecdhe_ecp() with ssl_kex_derive_dhe()tb2021-11-301-10/+10
* s/ECDHE/ECDH/jsing2021-11-301-3/+3
* First pass of converting ssl_kex.c to opaque DH.tb2021-11-291-30/+58
* Stop using BIO_s_file_inernal() in libssl.tb2021-11-293-13/+13
* Convert server serialisation of DHE parameters/public key to new functions.jsing2021-11-291-24/+3
* Factor out/rewrite DHE key exchange.jsing2021-11-293-66/+173
* Stop reaching into EVP_PKEY in the rest of libssl.tb2021-11-266-38/+55
* Simplify two weirdly formatted pieces of code in ssl_rsa.c and stoptb2021-11-261-27/+25
* spellingjsg2021-11-261-3/+3
* Transform a mangled comment into something intelligible.tb2021-11-231-2/+5
* libssl: don't reach for pkey->save_type.tb2021-11-192-5/+5
* Fix a strange check in the auto DH codepathtb2021-11-141-3/+5
* Switch to <endian.h> from <machine/endian.h> for better portability.bcook2021-11-091-3/+2
* Replace <sys/limits.h> with <limits.h>bcook2021-11-081-2/+2
* Do not take the strlen() of a NULL name. Defer the CBS_init() to later.tb2021-11-021-3/+3
* Ensure SSL_set_tlsext_host_name() is given a valid hostname.jsing2021-11-011-3/+8
* Improve SNI hostname validation.jsing2021-11-012-9/+54
* Unifdef LIBRESSL_NEW_API. Now that the library is bumped, this istb2021-11-011-5/+1
* Bump majors after struct visibility changes, symbol removal and symboltb2021-10-311-1/+1
* Update Symbols.list to include API additionstb2021-10-311-0/+10
* libssl: stop reaching into the X509 struct and simplify some code bytb2021-10-312-24/+6
* Add explicit CBS_contains_zero_byte() check in CBS_strdup().jsing2021-10-311-1/+6
* Fix HISTORY section: 6.9 -> 7.0tb2021-10-271-3/+3
* sort. alphanumerics have lower ASCII values than '_'tb2021-10-251-5/+5
* Install SSL_read_early_data.3. I should have done this during the lasttb2021-10-251-4/+2
* Add record processing limit to DTLS code.jsing2021-10-252-3/+18
* Use ssl_force_want_read() in the DTLS code.jsing2021-10-253-44/+15